نتایج جستجو برای: vulnerability
تعداد نتایج: 42681 فیلتر نتایج به سال:
Although vulnerability is central to many organizational theories of trust, little systematic research exists that specifically examines the relationship between vulnerability and trust. In this paper, we extend the concept of vulnerability to interfirm exchange relations and theorize its role in influencing interorganizational trust. We argue that existing theory on vulnerability and trust hav...
The growing interest in adaptation policies in the context of climate change, especially among developing countries, is making vulnerability assessment a very active area of research. Understanding present day vulnerabilities and adaptation potential among local communities is increasingly being considered as a pre-requisite to such assessments. This paper focuses on understanding and quantifyi...
Vulnerabilities are errors in computer systems which can be exploited to breach security mechanisms. Such information can be very valuable as it decides about the success of attack or defense in computer networks. This essay introduces into the economic perspective on computer security and discusses the advantages and drawbacks of different concepts for vulnerability markets, where security-rel...
Several traits related to foraging behaviour were assessed in young-of-the-year produced from largemouth bass Micropterus salmoides that had been exposed to four generations of artificial selection for vulnerability to angling. As recreational angling may target foraging ability, this study tested the hypothesis that selection for vulnerability to angling would affect behaviours associated with...
This paper attempts to contribute to international discourse on the responsibility of macro structures (economic and political) and private agencies for the production and distribution of vulnerability. It does so by focusing on an individual economic entity, small manufacturing firms (SMFs), in a specific location, western Athens, Greece. By evaluating the losses that SMFs sustained in the ear...
Cognitive vulnerability is a potent risk factor for depression. Individual differences in cognitive vulnerability solidify in early adolescence and remain stable throughout the life span. However, stability does not mean immutability. We hypothesized that cognitive vulnerability would be susceptible to change during major life transitions when social milieus undergo significant changes (e.g., m...
Assessing the vulnerability of an enterprise’s infrastructure is an important step in judging the security of a network and the trustworthiness and quality of the information that flows through it. Currently real-world infrastructure vulnerability is often judged in an ad hoc manner, based on the criteria and experience of the assessors. While methodological approaches to assessing infrastructu...
Software vulnerability analysis has become a hot topic recently. However, the traditional methods for analyzing software vulnerability have higher false positive rate. In this paper, adaptive K function is defined, and SVAAKSC (Software vulnerability analysis method based on adaptive-K sequence clustering) is presented. The collected objects in software vulnerability sequence database SVSD are ...
Assessment of ecoenvironmental vulnerability plays an important role in the guidance of regional planning, the construction and protection of ecological environment, which requires comprehensive consideration on regional resources, environment, ecology, society and other factors. Based on the driving mechanism and evolution characteristics of ecoenvironmental vulnerability in cold and arid regi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید